Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2006-1242

Опубликовано: 15 мар. 2006
Источник: ubuntu
Приоритет: untriaged
EPSS Низкий
CVSS2: 5

Описание

The ip_push_pending_frames function in Linux 2.4.x and 2.6.x before 2.6.16 increments the IP ID field when sending a RST after receiving unsolicited TCP SYN-ACK packets, which allows remote attackers to conduct an Idle Scan (nmap -sI) attack, which bypasses intended protections against such attacks.

РелизСтатусПримечание
devel

DNE

upstream

needs-triage

Показывать по

EPSS

Процентиль: 86%
0.0304
Низкий

5 Medium

CVSS2

Связанные уязвимости

redhat
больше 19 лет назад

The ip_push_pending_frames function in Linux 2.4.x and 2.6.x before 2.6.16 increments the IP ID field when sending a RST after receiving unsolicited TCP SYN-ACK packets, which allows remote attackers to conduct an Idle Scan (nmap -sI) attack, which bypasses intended protections against such attacks.

nvd
больше 19 лет назад

The ip_push_pending_frames function in Linux 2.4.x and 2.6.x before 2.6.16 increments the IP ID field when sending a RST after receiving unsolicited TCP SYN-ACK packets, which allows remote attackers to conduct an Idle Scan (nmap -sI) attack, which bypasses intended protections against such attacks.

debian
больше 19 лет назад

The ip_push_pending_frames function in Linux 2.4.x and 2.6.x before 2. ...

github
больше 3 лет назад

The ip_push_pending_frames function in Linux 2.4.x and 2.6.x before 2.6.16 increments the IP ID field when sending a RST after receiving unsolicited TCP SYN-ACK packets, which allows remote attackers to conduct an Idle Scan (nmap -sI) attack, which bypasses intended protections against such attacks.

EPSS

Процентиль: 86%
0.0304
Низкий

5 Medium

CVSS2